First published: Tue Oct 19 2021(Updated: )
Disconnecting L2CAP channel right after invalid ATT request leads freeze. Zephyr versions >= 2.4.0, >= 2.5.0 contain Use After Free (CWE-416). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-7g38-3x9v-v7vp
Credit: vulnerabilities@zephyrproject.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zephyrproject Zephyr | >=2.4.0<2.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3455 is a vulnerability in Zephyr versions 2.4.0 and above that allows an attacker to cause a denial of service by disconnecting the L2CAP channel after an invalid ATT request.
The severity of CVE-2021-3455 is high with a CVSS severity score of 7.5.
The CWE for CVE-2021-3455 is CWE-416 (Use After Free).
Zephyr versions >= 2.4.0, >= 2.5.0, and <= 2.6.0 are affected by CVE-2021-3455.
To fix CVE-2021-3455, it is recommended to update Zephyr to a version that includes the available patch or mitigation provided by the vendor.